Home
My Puzzles
FAQ
Report bug
Collected Puzzles
User listed puzzles
Random Puzzle
Log In/Out

1   2           3
  4  
  5              
6          
    7        
8                    
     
  9                        
   
10                    
 
11                      
 
12          
 
13            

Across
1.Hidden access technique left in software by developer for future technical support
5.3 headed dog, computer network authentication protocol
6.Malicious computer program which travels independently through network and infect system
7.Malicious self replicating computer program
8.encrypted information in cryptography, referred to as
9.weakness which allows an attacker to reduce a system's security
10.defiguring information to make it unreadable to anyone except those possessing special knowledge
11.tricking Web users into revealing confidential information while clicking on seemingly innocuous web pages
12.search engine which added default end-to-end encryption
13.search and destroy computer worm created to sabotage Iran's nuclear program
Down
2.Ice Cream Sandwich mobile technology
3.Driving through neighbourhood to detect insecure wireless access point
4.evaluating the security of a computer system by simulating an attack from malicious outsiders

Use the "Printable HTML" button to get a clean page, in either HTML or PDF, that you can use your browser's print button to print. This page won't have buttons or ads, just your puzzle. The PDF format allows the web site to know how large a printer page is, and the fonts are scaled to fill the page. The PDF takes awhile to generate. Don't panic!




Google
 
Web armoredpenguin.com

Copyright information Privacy information Contact us Blog